Static task
static1
Behavioral task
behavioral1
Sample
4abd814838c5d1b2b6ef34daaa84c6b5_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4abd814838c5d1b2b6ef34daaa84c6b5_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4abd814838c5d1b2b6ef34daaa84c6b5_JaffaCakes118
-
Size
23KB
-
MD5
4abd814838c5d1b2b6ef34daaa84c6b5
-
SHA1
574c02dbe0f68472f8a7f756fee1108571ede11d
-
SHA256
248a3b3a3e44a1ab9b15f321561a7218d078c9d5f4297984367bfb8c860448b7
-
SHA512
5101ce3f0013a1224fd602f62f7865ca00307bcf44555ee0e2f213e1038951353681009dcfd8fbb66b5f52a5c07cc7c24bf48bac0ab9aa0bc57cc6148755a986
-
SSDEEP
384:iBJIaF8LR4ehO06qk+pdvugjwUf0DCL24OgGHAL3e2Htls+:iBzmR4egipd2gj2DNgJL3e2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4abd814838c5d1b2b6ef34daaa84c6b5_JaffaCakes118
Files
-
4abd814838c5d1b2b6ef34daaa84c6b5_JaffaCakes118.dll windows:4 windows x86 arch:x86
b71c894f0f2baed8ef09d01d596e60ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
VirtualProtectEx
InitializeCriticalSection
GlobalFree
GlobalUnlock
GetPrivateProfileStringA
SetUnhandledExceptionFilter
Thread32Next
SetThreadContext
OpenThread
Thread32First
IsBadReadPtr
WideCharToMultiByte
Process32First
ReadProcessMemory
GetModuleFileNameA
GetCurrentThreadId
GetCurrentProcess
WriteProcessMemory
Process32Next
CloseHandle
TerminateThread
Sleep
CreateThread
GlobalAlloc
GlobalLock
LoadLibraryA
GetProcAddress
GetCurrentThread
GetCurrentProcessId
CreateMutexA
GetModuleHandleA
GetLastError
user32
GetWindowThreadProcessId
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
GetForegroundWindow
GetWindowTextA
FindWindowA
wininet
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
msvcrt
free
_initterm
malloc
_adjust_fdiv
_stricmp
_strlwr
strrchr
memset
wcslen
strcmp
strcat
sprintf
strcpy
memcpy
??2@YAPAXI@Z
strlen
strncpy
strstr
??3@YAXPAX@Z
sscanf
fclose
fread
fopen
Sections
.text Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdt Size: 512B - Virtual size: 153B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ